*#Look at the security implications of PDFs and what can be done in an enterprise environment to reduce these risks (uninstall Reader?)

+

*'''Incident Case Study - Charles Carmakal (Link TBA)'''

+

*:Review of the security breach landscape in the US and go through an interesting case study. It involved organised criminals from eastern Europe, over $100M of losses, and incredible sophistication. The initial point of entry for this breach was the web - SQL injection, linked databases, privilege escalation, development/deployment of custom malware.

[[Category:Australia]]

[[Category:Australia]]

Revision as of 14:40, 17 August 2012

OWASP Sydney

Welcome to the Sydney chapter homepage. The chapter leader roles are currently vacant, If interested please indicate your interest.
We are always looking for speakers - email one of the chapter leaders with your idea! Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Look at the security implications of PDFs and what can be done in an enterprise environment to reduce these risks (uninstall Reader?)

Incident Case Study - Charles Carmakal (Link TBA)

Review of the security breach landscape in the US and go through an interesting case study. It involved organised criminals from eastern Europe, over $100M of losses, and incredible sophistication. The initial point of entry for this breach was the web - SQL injection, linked databases, privilege escalation, development/deployment of custom malware.